Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-0707

Опубликовано: 15 фев. 2006
Источник: debian
EPSS Низкий

Описание

PyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pyblosxomfixed1.3.2-1package
pyblosxomnot-affectedsargepackage

EPSS

Процентиль: 60%
0.00427
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

PyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable.

nvd
почти 20 лет назад

PyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable.

github
больше 3 лет назад

PyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable.

EPSS

Процентиль: 60%
0.00427
Низкий